A Survey of Cybersecurity of Digital Manufacturing

作者: Priyanka Mahesh , Akash Tiwari , Chenglu Jin , Panganamala R. Kumar , A. L. Narasimha Reddy

DOI: 10.1109/JPROC.2020.3032074

关键词:

摘要: The Industry 4.0 concept promotes a digital manufacturing (DM) paradigm that can enhance quality and productivity, which reduces inventory the lead time for delivering custom, batch-of-one products based on achieving convergence of additive, subtractive, hybrid machines, automation robotic systems, sensors, computing, communication networks, artificial intelligence, big data. A DM system consists embedded electronics, actuators, control software, interconnectivity to enable machines components within them exchange data with other therein, plant operators, managers, customers. This article presents cybersecurity risks in emerging context, assesses impact manufacturing, identifies approaches secure DM.

参考文章(106)
Susan M. Bridges, Ken Keiser, Nathan Sissom, Sara J. Graves, Cyber Security for Additive Manufacturing Proceedings of the 10th Annual Cyber and Information Security Research Conference. pp. 14- ,(2015) , 10.1145/2746266.2746280
Prahalad Rao, Satish Bukkapatnam, Omer Beyca, Zhenyu Kong, Ranga Komanduri, None, Real-Time Identification of Incipient Surface Morphology Variations in Ultraprecision Machining Process Journal of Manufacturing Science and Engineering-transactions of The Asme. ,vol. 136, pp. 021008- ,(2014) , 10.1115/1.4026210
Swarup Bhunia, Michael S. Hsiao, Mainak Banga, Seetharam Narasimhan, Hardware Trojan Attacks: Threat Analysis and Countermeasures Proceedings of the IEEE. ,vol. 102, pp. 1229- 1247 ,(2014) , 10.1109/JPROC.2014.2334493
Ramesh Karri, Jeyavijayan Rajendran, Kurt Rosenfeld, Mohammad Tehranipoor, Trustworthy Hardware: Identifying and Classifying Hardware Trojans IEEE Computer. ,vol. 43, pp. 39- 46 ,(2010) , 10.1109/MC.2010.299
Swaroop Ghosh, Abhishek Basak, Swarup Bhunia, How Secure Are Printed Circuit Boards Against Trojan Attacks IEEE Design & Test of Computers. ,vol. 32, pp. 7- 16 ,(2015) , 10.1109/MDAT.2014.2347918
Mark Yampolskiy, Todd R Andel, J Todd McDonald, William B Glisson, Alec Yasinsac, None, Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing Proceedings of the 4th Program Protection and Reverse Engineering Workshop. pp. 7- ,(2014) , 10.1145/2689702.2689709
Sean Weerakkody, Yilin Mo, Bruno Sinopoli, Detecting integrity attacks on control systems using robust physical watermarking conference on decision and control. pp. 3757- 3764 ,(2014) , 10.1109/CDC.2014.7039974
Changqing Cheng, Akkarapol Sa-Ngasoongsong, Omer Beyca, Trung Le, Hui Yang, Zhenyu Kong, Satish TS Bukkapatnam, None, Time series forecasting for nonlinear and non-stationary processes: a review and comparative study Iie Transactions. ,vol. 47, pp. 1053- 1071 ,(2015) , 10.1080/0740817X.2014.999180
Masoud Rostami, Farinaz Koushanfar, Ramesh Karri, A Primer on Hardware Security: Models, Methods, and Metrics Proceedings of the IEEE. ,vol. 102, pp. 1283- 1295 ,(2014) , 10.1109/JPROC.2014.2335155
Rajkumar Palanna, Satish Bukkapatnam, F. Stan Settles, Model-Based Tampering for Improved Process Performance—An Application to Grinding of Shafts Journal of Manufacturing Processes. ,vol. 5, pp. 24- 32 ,(2003) , 10.1016/S1526-6125(03)70037-1